全文获取类型
收费全文 | 103057篇 |
免费 | 12615篇 |
国内免费 | 8294篇 |
专业分类
电工技术 | 10185篇 |
技术理论 | 2篇 |
综合类 | 9544篇 |
化学工业 | 12894篇 |
金属工艺 | 6413篇 |
机械仪表 | 7199篇 |
建筑科学 | 8081篇 |
矿业工程 | 3997篇 |
能源动力 | 2924篇 |
轻工业 | 10153篇 |
水利工程 | 3205篇 |
石油天然气 | 4147篇 |
武器工业 | 1422篇 |
无线电 | 12251篇 |
一般工业技术 | 9401篇 |
冶金工业 | 4018篇 |
原子能技术 | 1782篇 |
自动化技术 | 16348篇 |
出版年
2024年 | 641篇 |
2023年 | 1846篇 |
2022年 | 3985篇 |
2021年 | 5551篇 |
2020年 | 3905篇 |
2019年 | 2823篇 |
2018年 | 3091篇 |
2017年 | 3579篇 |
2016年 | 3213篇 |
2015年 | 4944篇 |
2014年 | 5989篇 |
2013年 | 7123篇 |
2012年 | 8681篇 |
2011年 | 8845篇 |
2010年 | 8336篇 |
2009年 | 8070篇 |
2008年 | 7893篇 |
2007年 | 7717篇 |
2006年 | 6591篇 |
2005年 | 5297篇 |
2004年 | 3852篇 |
2003年 | 2686篇 |
2002年 | 2486篇 |
2001年 | 2154篇 |
2000年 | 1721篇 |
1999年 | 844篇 |
1998年 | 415篇 |
1997年 | 313篇 |
1996年 | 265篇 |
1995年 | 235篇 |
1994年 | 165篇 |
1993年 | 105篇 |
1992年 | 108篇 |
1991年 | 74篇 |
1990年 | 60篇 |
1989年 | 52篇 |
1988年 | 29篇 |
1987年 | 21篇 |
1986年 | 30篇 |
1985年 | 12篇 |
1984年 | 26篇 |
1983年 | 9篇 |
1982年 | 12篇 |
1981年 | 17篇 |
1980年 | 35篇 |
1979年 | 22篇 |
1977年 | 9篇 |
1976年 | 18篇 |
1959年 | 19篇 |
1951年 | 17篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
121.
今日头条的服务器每天都会产生规模庞大的训练数据,为方便进行训练,这些数据都具有特定的格式和分布特征。使用不同类型的通用压缩算法(字典类型及非字典类型)进行测试,发现单独任何一种算法都无法在满足业务需求(速率需求和CPU占比等)的同时获得较为可观的压缩比。针对今日头条的训练数据,提出了分段聚类压缩和Hash recoding压缩两种策略。实验结果表明,分段聚类压缩方式在更好地保证了压缩率的同时提高了压缩速率的目的;Hash recoding压缩方式则更好地达到了以少量压缩速率的损失换取更可观的压缩率的目的。分段聚类方式搭配Gzip压缩算法的组合能使压缩速率提高300%以上;Hash recoding方式匹配Snappy压缩算法能使压缩率缩小50%以上。根据实际需求,不论选择哪种策略,对于降低今日头条的运营成本,提升业务处理的效率,提供更好的用户体验,都有一定意义。 相似文献
122.
Bo Ren Longbiao Wang Liang Lu Yuma Ueda Atsuhiko Kai 《Multimedia Tools and Applications》2016,75(9):5093-5108
The performance of speech recognition in distant-talking environments is severely degraded by the reverberation that can occur in enclosed spaces (e.g., meeting rooms). To mitigate this degradation, dereverberation techniques such as network structure-based denoising autoencoders and multi-step linear prediction are used to improve the recognition accuracy of reverberant speech. Regardless of the reverberant conditions, a novel discriminative bottleneck feature extraction approach has been demonstrated to be effective for speech recognition under a range of conditions. As bottleneck feature extraction is not primarily designed for dereverberation, we are interested in whether it can compensate for other carefully designed dereverberation approaches. In this paper, we propose three schemes covering both front-end processing (cascaded combination and parallel combination) and back-end processing (system combination). Each of these schemes integrates bottleneck feature extraction with dereverberation. The effectiveness of these schemes is evaluated via a series of experiments using the REVERB challenge dataset. 相似文献
123.
124.
Bo Fan Lei Xie Shan Yang Lijuan Wang Frank K. Soong 《Multimedia Tools and Applications》2016,75(9):5287-5309
This paper proposes a deep bidirectional long short-term memory approach in modeling the long contextual, nonlinear mapping between audio and visual streams for video-realistic talking head. In training stage, an audio-visual stereo database is firstly recorded as a subject talking to a camera. The audio streams are converted into acoustic feature, i.e. Mel-Frequency Cepstrum Coefficients (MFCCs), and their textual labels are also extracted. The visual streams, in particular, the lower face region, are compactly represented by active appearance model (AAM) parameters by which the shape and texture variations can be jointly modeled. Given pairs of the audio and visual parameter sequence, a DBLSTM model is trained to learn the sequence mapping from audio to visual space. For any unseen speech audio, whether it is original recorded or synthesized by text-to-speech (TTS), the trained DBLSTM model can predict a convincing AAM parameter trajectory for the lower face animation. To further improve the realism of the proposed talking head, the trajectory tiling method is adopted to use the DBLSTM predicted AAM trajectory as a guide to select a smooth real sample image sequence from the recorded database. We then stitch the selected lower face image sequence back to a background face video of the same subject, resulting in a video-realistic talking head. Experimental results show that the proposed DBLSTM approach outperforms the existing HMM-based approach in both objective and subjective evaluations. 相似文献
125.
Weiran Liu Jianwei Liu Qianhong Wu Bo Qin Yan Li 《International Journal of Information Security》2016,15(1):35-50
We focus on practical Hierarchical Identity-Based Broadcast Encryption (HIBBE) with semantic security against adaptively chosen-ciphertext attacks (CCA2) in the standard model. We achieve this goal in two steps. First, we propose a new HIBBE scheme that is secure against chosen-plaintext attacks (CPA). Compared with the existing HIBBE scheme that is built from composite-order bilinear groups, our construction is based on prime-order bilinear groups. The much better efficiency of group operations in prime-order bilinear groups makes our proposed HIBBE scheme more practical. Then, we convert it into a CCA2-secure scheme at the cost of a one-time signature. Instead of extending one user hierarchy in the Canetti–Halevi–Katz approach from CPA-secure (\(l+1\))-Hierarchical Identity-Based Encryption [(\(l+1\))-HIBE] to CCA2-secure \(l\)-HIBE, our construction merely adds one on-the-fly dummy user in the basic scheme. We formally prove the security of these two schemes in the standard model. Comprehensive theoretical analyses and experimental results demonstrate that the proposed HIBBE schemes achieve desirable performance. 相似文献
126.
127.
Mariwan Ahmed Lu Liu James Hardy Bo Yuan Nick Antonopoulos 《Personal and Ubiquitous Computing》2016,20(3):283-293
Internet of Things (IoT) connects billions of devices in an Internet-like structure. Each device encapsulated as a real-world service which provides functionality and exchanges information with other devices. This large-scale information exchange results in new interactions between things and people. Unlike traditional web services, internet of services is highly dynamic and continuously changing due to constant degrade, vanish and possibly reappear of the devices, this opens a new challenge in the process of resource discovery and selection. In response to increasing numbers of services in the discovery and selection process, there is a corresponding increase in number of service consumers and consequent diversity of quality of service (QoS) available. Increase in both sides’ leads to the diversity in the demand and supply of services, which would result in the partial match of the requirements and offers. This paper proposed an IoT service ranking and selection algorithm by considering multiple QoS requirements and allowing partially matched services to be counted as a candidate for the selection process. One of the applications of IoT sensory data that attracts many researchers is transportation especially emergency and accident services which is used as a case study in this paper. Experimental results from real-world services showed that the proposed method achieved significant improvement in the accuracy and performance in the selection process. 相似文献
128.
本文通过对螺栓定力断裂机理进行分析及计算,分别从失效形式及断裂源找出导致螺栓断裂的原因,并对影响预紧力的因素逐一分析,得出预紧力与摩擦系数的关系,对为各类螺栓定力做好技术储备,并提出防范措施。 相似文献
129.
针对胃上皮肿瘤细胞图像(以下简称肿瘤细胞图像)黏结严重和信息冗余的特点,提出了一种将自适应观测矩阵的压缩感知(SAM-CS)和自组织特征映射(SOFM)神经网络相结合的算法。该算法将肿瘤细胞图像拉成列向量,然后利用通过自适应过程产生的观测矩阵,基于压缩感知理论对图像信息进行观测,产生线性观测向量,最后利用SOFM神经网络的学习算法对观测向量进行训练和分类,实现对肿瘤细胞图像的识别。实验表明,相比常用算法,该算法至少提高了4.2%的识别准确率和5.7%的运算速度。 相似文献
130.